Portal Walkthrough: Control 2.1 - Managed Environments
Last Updated: January 2026 Portal: Power Platform Admin Center Estimated Time: 30-45 minutes per environment
Prerequisites
- Power Platform Admin role assigned
- Access to Power Platform Admin Center
- Target environment(s) identified
- Governance zone classification determined
- Environment region is United States (US-only requirement)
- DLP policies created and ready to apply
- Maker welcome content drafted
Step-by-Step Configuration
Step 1: Navigate to Environment
- Open Power Platform Admin Center
- Select Environments in left navigation
- Click on the target environment name
Step 2: Access Managed Environment Settings
- Locate the Managed environments card on the environment page
- Click Edit managed environments link
- Or use toolbar button: Edit managed environments
- In the panel, set Managed environment to On (enabled)
- Leave the panel open to configure the settings below before saving
Step 3: Configure Sharing Limits
In the "Manage sharing" section, configure limits for each resource type:
Power Apps
- Expand Power Apps section
- Select: "Don't set limits" OR configure sharing restrictions
Power Automate
- Expand Power Automate section
- Configure flow sharing limits
Copilot Studio
Expand Copilot Studio section to configure agent sharing:
Editors:
- Check/uncheck "Let people grant Editor permissions when agents are shared"
Viewers:
- Check/uncheck "Let people grant Viewer permissions when agents are shared"
- "Only share with individuals (no security groups)" - Prevents sharing with security groups
- "Limit the number of viewers who can access each agent" - Set numeric limit
Governance Zone Recommendations:
| Zone | Editors | Viewers | Individuals Only | Viewer Limit |
|---|---|---|---|---|
| Zone 1 | Disabled | Disabled | N/A | N/A |
| Zone 2 | Enabled | Enabled | No | No limit |
| Zone 3 | Disabled | Enabled | No | Consider limit |
Note: Sharing limits do not apply when agent authentication is set to "No authentication". Always enable authentication for shared/enterprise agents.
See Sharing limits for details.
Step 4: Configure Solution Checker
- Locate Solution checker enforcement section
- Set enforcement level using slider:
- None: No enforcement (personal productivity)
- Warn: Email notifications on issues (team collaboration)
- Block: Prevent import of solutions with issues (enterprise managed)
- Optionally configure excluded rules
- Enable email notifications: "Send emails only when a solution is blocked"
FSI Recommendation: Set to Block for enterprise-managed production environments to prevent deployment of solutions with security vulnerabilities.
Prerequisite note: Solution Checker enforcement requires a Dataverse-backed environment and solution import scenarios. If the environment does not use Dataverse/solutions, document "Not applicable" and rely on other governance controls (DLP, sharing limits, and change management).
Step 5: Enable Usage Insights
- Locate Usage insights section
- Check Include insights for this environment in the weekly email digest
- Check Add additional recipients for the weekly digest and add:
- Compliance Officer email
- Security Team distribution list
See Usage insights for details.
Step 6: Configure Maker Welcome Content
- Locate Maker welcome content section
- Enter governance guidance in Markdown or plain text (1500 character limit)
- Add Learn more link to full policy documentation
- Click See preview to verify formatting
Example content for a team collaboration environment:
## Welcome to [Environment Name]
This is a **team collaboration environment**. Before creating agents:
- Review the Agent Governance Policy
- Complete required training
- All agents require manager approval before sharing
Contact governance@company.com for questions.
Step 7: Configure AI Features (Optional)
- Locate Enable AI-generated app descriptions (preview) section
- Enable/disable based on organization policy
- Review warning about potential inaccuracies
Step 8: Review Data Policies
- Locate Data policies section
- Select See active data policies for this environment
- Verify the expected DLP policy/policies are applied to this environment (record policy name(s))
- If policies are missing, assign them:
- PPAC > Data policies > open the policy > Environments > add/select the target environment > Save
- Capture evidence:
- Screenshot of the environment's Data policies showing the active policy list
- Screenshot of the DLP policy Environments tab showing the environment assigned
Step 9: Save Configuration
- Review all settings
- Click Save to apply changes
- Verify settings are active by reopening the panel
Step 10: Environment Routing Tie-in (Recommended)
Managed Environments complement Environment Groups and Environment Routing to ensure makers are routed into governed environments by default.
- PPAC > Environments > Environment groups
- Create or open the target environment group (US-only scope)
- Add the managed environment(s) to the group
- Enable/configure environment routing per your standard in Control 2.15: Environment Routing
- Capture evidence:
- Screenshot of the environment group membership showing the managed environment included
- Screenshot of the environment routing configuration/rules used for routing makers
Configuration by Governance Level
| Setting | Baseline (Zone 1) | Recommended (Zone 2) | Regulated (Zone 3) |
|---|---|---|---|
| Managed Environment | Enabled for non-personal | Enabled for all non-personal | Mandatory |
| Sharing Limits - Apps | Unlimited | 50 users | Security groups only |
| Sharing Limits - Flows | Unlimited | 25 users | Security groups only |
| Sharing Limits - Agents | Unlimited | 25 users | Security groups only |
| Solution Checker | None | Warn | Block |
| Usage Insights | Optional | Enabled | Enabled + Compliance CC |
| Maker Welcome | Optional | Recommended | Required with acknowledgment |
Cross-Tenant Restrictions Configuration
Cross-tenant restrictions control whether connectors and data flows can interact with resources in other Microsoft Entra tenants. For FSI organizations, this is critical to prevent data leakage to unauthorized external tenants.
Configuration:
- In Power Platform Admin Center, navigate to Environments > select target environment
- Go to Settings > Product > Privacy + Security
- Configure Cross-tenant inbound and Cross-tenant outbound settings:
- Disabled: Block all cross-tenant connector access (recommended for Zone 3)
- Enabled with restrictions: Allow only approved tenants via allowlist
- Enabled: Allow cross-tenant access (not recommended for regulated environments)
FSI Recommendations:
| Zone | Inbound | Outbound |
|---|---|---|
| Zone 1 | Disabled | Disabled |
| Zone 2 | Disabled | Disabled or approved tenants only |
| Zone 3 | Disabled | Disabled |
See Cross-tenant restrictions for detailed configuration guidance.
FSI Example Configuration
Organization: Regional Investment Management Firm
Environment: FSI-Client-Services-Prod
Managed Environment Configuration:
Status: Enabled
Sharing Controls:
Power Apps: Security groups only
Power Automate: Security groups only
Copilot Studio: Security groups only
Approved Groups:
- sg-client-services-users
- sg-compliance-reviewers
Solution Checker:
Enforcement: Block
Validation: Critical and High severity items block import
Exceptions: Documented exception process required
Usage Insights:
Enabled: Yes
Recipients:
- it-governance@firm.com
- compliance@firm.com
Frequency: Weekly
Maker Welcome Content:
Title: "Enterprise Managed Production Environment - Regulated"
Content: |
This is an enterprise-managed regulated environment.
All solutions require governance approval.
Client data is subject to SEC and FINRA regulations.
Contact compliance@firm.com before publishing.
Acknowledgment: Required
Data Policies:
Active Policies:
- FSI-Block-Consumer-Connectors
- FSI-Customer-Data-Protection
Validation
After completing these steps, verify:
- Managed Environment card shows enabled status
- Sharing limits configured per governance zone
- Solution checker set to appropriate enforcement level
- Usage insights enabled with correct recipients
- Maker welcome content displays correctly (use preview)
- Data policies are applied and visible
- Cross-tenant restrictions configured appropriately
- Environment creation restricted to authorized admins only (PPAC > Tenant Settings)
- Environment routing configured for correct region (PPAC > Tenant Settings > Environment Routing)
- Tenant isolation enabled (PPAC > Security > Identity and access > Tenant Isolation)
- Security groups assigned to all Zone 2/3 environments
Step 11: Restrict Environment Creation
- Sign in to Power Platform Admin Center (https://admin.powerplatform.microsoft.com)
- Navigate to Manage > Tenant Settings
- For each of the following, select "Only specific admins":
- Developer environment assignments
- Production environment assignments
- Trial environment assignments
- Select Save
Uncontrolled Environment Sprawl
If left as "Everyone," any user can create trial or developer environments that may store sensitive data outside of governance controls.
Step 12: Configure Environment Routing
- In PPAC > Manage > Tenant Settings > Environment Routing
- Configure routing rules to direct new environments to the correct region
- Align with data residency requirements for your jurisdiction
- Select Save
Step 13: Enable Tenant Isolation
- In PPAC > Security > Identity and access > Tenant Isolation
- Enable "Restrict Cross-Tenant Connections"
- Configure explicit exceptions by Tenant ID and direction only for trusted partner tenants
- Select Save
Step 14: Assign Environment Security Groups
- In PPAC > Environments, select each Zone 2/3 environment
- Select Edit and locate the Security group field
- Assign the appropriate Entra ID security group to restrict who can access the environment
- Select Save
- Repeat for all Zone 2 and Zone 3 environments
Back to Control 2.1 | PowerShell Setup | Verification Testing | Troubleshooting
Updated: February 2026 | Version: v1.3 | Classification: Portal Walkthrough